Book description
This book provides technical information on multimedia security and steganography as well as the fundamental theoretical framework for developing extensive advanced techniques. By understanding essential principles of multimedia security and steganographic systems, readers can develop novel ideas in implementing advanced algorithms. Topics include automatic detection and removal of visible image watermarks, digital watermarking based on chaotic map and reference register, digital steganographic schemes based on image vector quantization, image inpainting using an enhanced exemplar-based algorithm, and behavior modeling of human objects in multimedia content.
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Preface
- Acknowledgments
- Editor
- Contributors
- PART I Multimedia Mining and Classification
-
PART II Watermarking
- Chapter 4 Automatic Detection and Removal of Visible Image Watermarks
- Chapter 5 Digital Watermarking Based on Chaotic Map and Reference Register
- Chapter 6 Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking
- Chapter 7 Reversible Data-Hiding Techniques for Digital Images
- Chapter 8 Watermarking Based on Local Binary Pattern Operators
- Chapter 9 Authentication of JPEG Images Based on Genetic Algorithms
- Chapter 10 An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery
-
PART III Steganography
- Chapter 11 Survey of Image Steganography and Steganalysis
- Chapter 12 Digital Steganographic Schemes Based on Image Vector Quantization
- Chapter 13 Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System
- Chapter 14 Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems
-
PART IV Forensics
- Chapter 15 Image Inpainting Using an Enhanced Exemplar-Based Algorithm
- Chapter 16 A Comparison Study on Copy-Cover Image Forgery Detection
- Chapter 17 Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities
- Chapter 18 Video Forensics
- Chapter 19 Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption
- Chapter 20 Behavior Modeling of Human Objects in Multimedia Content
- Index
Product information
- Title: Multimedia Security
- Author(s):
- Release date: December 2017
- Publisher(s): CRC Press
- ISBN: 9781351832816
You might also like
book
Computer Forensics InfoSec Pro Guide
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of …
book
Network Attacks and Defenses
Using step-by-step processes to build and generate attacks using offensive techniques, this volume enables readers to …
book
Computer Forensics and Digital Investigation with EnCase Forensic v7
Conduct repeatable, defensible investigations with EnCase Forensic v7 Maximize the powerful tools and features of the …
book
Cryptography InfoSec Pro Guide
Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals …